Cybersecurity Managing Risk in the Information Age
Cybersecurity Managing Risk in the Information Age
OBJECTIVES
- Identify and communicate the detection of a security breach
- Recommend optimal strategies for responding to a cyber attack and how to prevent further damage
- Assess the vulnerabilities of an organization’s critical business systems, networks, and data
- Identify the critical business systems, networks, and data, and their potential vulnerabilities
- Ensure your organization remains compliant through an understanding of cyber law and the requirements that govern a business or sector
- Design and implement a risk mitigation strategy for an organization
COURSE OUTLINE
- Cybersecurity risk is business risk
- Identifying the threats to an organization
- Identifying important business systems and assets
- The crucial role of leadership in managing cyber risk
- Understanding your technology
- Cyber risk and the law
- Incident response and accountability
- Designing and implementing a mitigation strategy